All of lore.kernel.org
 help / color / mirror / Atom feed
diff for duplicates of <20170109150249.11667-7-mcgrof@kernel.org>

diff --git a/a/1.txt b/N1/1.txt
index 14234c1..defdb1f 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -24,8 +24,8 @@ foo_fixup
 Completed initializing pci !
 Number of init entries: 1
 Initializing kprobes ...
-== OK: test_kprobe_0001 within range!
-== OK: test_kprobe_0002 not in range as expected!
+= OK: test_kprobe_0001 within range!
+= OK: test_kprobe_0002 not in range as expected!
 Completed initializing kprobes !
 Initializing kasan ...
 Early init for Kasan...
@@ -229,8 +229,7 @@ index bc2d9f46cde6..2f2bb1fc0798 100644
 +   :doc: Linker table provenance and userspace testing
  
  Benefits of using Linker tables
- ===============================
-diff --git a/MAINTAINERS b/MAINTAINERS
+ ===============diff --git a/MAINTAINERS b/MAINTAINERS
 index bbf519da3a78..30105cd3edaf 100644
 --- a/MAINTAINERS
 +++ b/MAINTAINERS
@@ -720,7 +719,7 @@ index 000000000000..65fb076765f8
 + * At least as per nasm (x86/x86_64 only), in the absence of qualifiers the
 + * defaults are as follows:
 + *
-+ * section .text    progbits  alloc   exec    nowrite  align=16
++ * section .text    progbits  alloc   exec    nowrite  align\x16
 + * section .rodata  progbits  alloc   noexec  nowrite  align=4
 + * section .lrodata progbits  alloc   noexec  nowrite  align=4
 + * section .data    progbits  alloc   noexec  write    align=4
@@ -912,7 +911,7 @@ index 000000000000..1e64674f6d7d
 + *
 + *   bool is_empty = LINKTABLE_EMPTY(some_fns);
 + */
-+#define SECTION_RANGE_EMPTY(name)	(SECTION_RANGE_SIZE(name) == 0)
++#define SECTION_RANGE_EMPTY(name)	(SECTION_RANGE_SIZE(name) = 0)
 +
 +/**
 + * SECTION_RANGE_ADDR_WITHIN - returns true if address is in the section range
@@ -1415,7 +1414,7 @@ index 000000000000..64b864949a02
 + *
 + *   bool is_empty = LINKTABLE_EMPTY(frobnicator_fns);
 + */
-+#define LINKTABLE_EMPTY(name)	(LINKTABLE_SIZE(name) == 0)
++#define LINKTABLE_EMPTY(name)	(LINKTABLE_SIZE(name) = 0)
 +
 +/**
 + * LINKTABLE_ADDR_WITHIN - returns true if address is in the linker table
@@ -1845,8 +1844,7 @@ index 000000000000..9d4e6fb0d176
 +include $(srctree)/tools/build/Makefile.include
 +
 +ifeq ($(V),1)
-+	Q=
-+	NQ=@true
++	Q+	NQ=@true
 +else
 +	Q=@
 +	NQ=@echo
@@ -2000,7 +1998,7 @@ index 000000000000..729241f9e4c4
 +++ b/tools/linker-tables/README
 @@ -0,0 +1,114 @@
 +Linux linker table userspace sandbox
-+====================================
++==================
 +
 +This is a userspace sandbox to allow easy experimentation and
 +test extensions with linker tables. It tries to mimic the Linux
@@ -2015,8 +2013,7 @@ index 000000000000..729241f9e4c4
 +application.
 +
 +History
-+=======
-+
++===+
 +This was hacked on first in an external repository, that tree has
 +the full set of history of how this work came about. Refer to that
 +tree for more details if you are interested in the logic used for
@@ -2028,8 +2025,7 @@ index 000000000000..729241f9e4c4
 +is kept in sync with the kernel.
 +
 +Compile
-+=======
-+
++===+
 +Run:
 +	make
 +
@@ -2042,8 +2038,7 @@ index 000000000000..729241f9e4c4
 +	make OUTPUT=/tmp/path/ clean
 +
 +Supported architectures
-+=======================
-+
++===========+
 +x86_64
 +
 +Currently only x86_64 is supported for the demo. It should be
@@ -2058,8 +2053,7 @@ index 000000000000..729241f9e4c4
 +file over.
 +
 +x86 Simulated boots
-+===================
-+
++=========+
 +This programs simulates boot on both bare metal and with the
 +Xen PV entry on x86.
 +
@@ -2072,7 +2066,7 @@ index 000000000000..729241f9e4c4
 +./demo -x
 +
 +Testing new features
-+====================
++==========
 +
 +A copy of each kernel header file is maintained in tools/include/,
 +as well as a respective generated asm file for each sandbox supported
@@ -2091,8 +2085,7 @@ index 000000000000..729241f9e4c4
 +each respective tools/linker-tables/arch/$(ARCH)/include/asm/.
 +
 +Features evaluation
-+===================
-+
++=========+
 +This lists features currently being evaluated in the sandbox, not yet
 +present upstream. These make use of the existing set of header files
 +without modification.
@@ -2674,15 +2667,15 @@ index 000000000000..c4e42beae55b
 +{
 +	if (SECTION_RANGE_ADDR_WITHIN(kprobes, addr))
 +		if (should_match)
-+			pr_info("== OK: %s within range!\n", test);
++			pr_info("= OK: %s within range!\n", test);
 +		else
-+			pr_info("== FAIL: %s should not be in range...\n",
++			pr_info("= FAIL: %s should not be in range...\n",
 +				test);
 +	else
 +		if (should_match)
-+			pr_info("== FAIL: %s should be in range...\n", test);
++			pr_info("= FAIL: %s should be in range...\n", test);
 +		else
-+			pr_info("== OK: %s not in range as expected!\n", test);
++			pr_info("= OK: %s not in range as expected!\n", test);
 +}
 +
 +void early_init_kprobes(void)
diff --git a/a/content_digest b/N1/content_digest
index 24f726b..995bbba 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -2,7 +2,7 @@
  "ref\020170109150249.11667-1-mcgrof@kernel.org\0"
  "From\0Luis R. Rodriguez <mcgrof@kernel.org>\0"
  "Subject\0[PATCH v3 6/6] tools: add userspace linker table sandbox\0"
- "Date\0Mon,  9 Jan 2017 07:02:49 -0800\0"
+ "Date\0Mon, 09 Jan 2017 15:02:49 +0000\0"
  "To\0hpa@zytor.com"
   acme@redhat.com
   tglx@linutronix.de
@@ -81,8 +81,8 @@
  "Completed initializing pci !\n"
  "Number of init entries: 1\n"
  "Initializing kprobes ...\n"
- "== OK: test_kprobe_0001 within range!\n"
- "== OK: test_kprobe_0002 not in range as expected!\n"
+ "= OK: test_kprobe_0001 within range!\n"
+ "= OK: test_kprobe_0002 not in range as expected!\n"
  "Completed initializing kprobes !\n"
  "Initializing kasan ...\n"
  "Early init for Kasan...\n"
@@ -286,8 +286,7 @@
  "+   :doc: Linker table provenance and userspace testing\n"
  " \n"
  " Benefits of using Linker tables\n"
- " ===============================\n"
- "diff --git a/MAINTAINERS b/MAINTAINERS\n"
+ " ===============diff --git a/MAINTAINERS b/MAINTAINERS\n"
  "index bbf519da3a78..30105cd3edaf 100644\n"
  "--- a/MAINTAINERS\n"
  "+++ b/MAINTAINERS\n"
@@ -777,7 +776,7 @@
  "+ * At least as per nasm (x86/x86_64 only), in the absence of qualifiers the\n"
  "+ * defaults are as follows:\n"
  "+ *\n"
- "+ * section .text    progbits  alloc   exec    nowrite  align=16\n"
+ "+ * section .text    progbits  alloc   exec    nowrite  align\026\n"
  "+ * section .rodata  progbits  alloc   noexec  nowrite  align=4\n"
  "+ * section .lrodata progbits  alloc   noexec  nowrite  align=4\n"
  "+ * section .data    progbits  alloc   noexec  write    align=4\n"
@@ -969,7 +968,7 @@
  "+ *\n"
  "+ *   bool is_empty = LINKTABLE_EMPTY(some_fns);\n"
  "+ */\n"
- "+#define SECTION_RANGE_EMPTY(name)\t(SECTION_RANGE_SIZE(name) == 0)\n"
+ "+#define SECTION_RANGE_EMPTY(name)\t(SECTION_RANGE_SIZE(name) = 0)\n"
  "+\n"
  "+/**\n"
  "+ * SECTION_RANGE_ADDR_WITHIN - returns true if address is in the section range\n"
@@ -1472,7 +1471,7 @@
  "+ *\n"
  "+ *   bool is_empty = LINKTABLE_EMPTY(frobnicator_fns);\n"
  "+ */\n"
- "+#define LINKTABLE_EMPTY(name)\t(LINKTABLE_SIZE(name) == 0)\n"
+ "+#define LINKTABLE_EMPTY(name)\t(LINKTABLE_SIZE(name) = 0)\n"
  "+\n"
  "+/**\n"
  "+ * LINKTABLE_ADDR_WITHIN - returns true if address is in the linker table\n"
@@ -1902,8 +1901,7 @@
  "+include $(srctree)/tools/build/Makefile.include\n"
  "+\n"
  "+ifeq ($(V),1)\n"
- "+\tQ=\n"
- "+\tNQ=@true\n"
+ "+\tQ+\tNQ=@true\n"
  "+else\n"
  "+\tQ=@\n"
  "+\tNQ=@echo\n"
@@ -2057,7 +2055,7 @@
  "+++ b/tools/linker-tables/README\n"
  "@@ -0,0 +1,114 @@\n"
  "+Linux linker table userspace sandbox\n"
- "+====================================\n"
+ "+==================\n"
  "+\n"
  "+This is a userspace sandbox to allow easy experimentation and\n"
  "+test extensions with linker tables. It tries to mimic the Linux\n"
@@ -2072,8 +2070,7 @@
  "+application.\n"
  "+\n"
  "+History\n"
- "+=======\n"
- "+\n"
+ "+===+\n"
  "+This was hacked on first in an external repository, that tree has\n"
  "+the full set of history of how this work came about. Refer to that\n"
  "+tree for more details if you are interested in the logic used for\n"
@@ -2085,8 +2082,7 @@
  "+is kept in sync with the kernel.\n"
  "+\n"
  "+Compile\n"
- "+=======\n"
- "+\n"
+ "+===+\n"
  "+Run:\n"
  "+\tmake\n"
  "+\n"
@@ -2099,8 +2095,7 @@
  "+\tmake OUTPUT=/tmp/path/ clean\n"
  "+\n"
  "+Supported architectures\n"
- "+=======================\n"
- "+\n"
+ "+===========+\n"
  "+x86_64\n"
  "+\n"
  "+Currently only x86_64 is supported for the demo. It should be\n"
@@ -2115,8 +2110,7 @@
  "+file over.\n"
  "+\n"
  "+x86 Simulated boots\n"
- "+===================\n"
- "+\n"
+ "+=========+\n"
  "+This programs simulates boot on both bare metal and with the\n"
  "+Xen PV entry on x86.\n"
  "+\n"
@@ -2129,7 +2123,7 @@
  "+./demo -x\n"
  "+\n"
  "+Testing new features\n"
- "+====================\n"
+ "+==========\n"
  "+\n"
  "+A copy of each kernel header file is maintained in tools/include/,\n"
  "+as well as a respective generated asm file for each sandbox supported\n"
@@ -2148,8 +2142,7 @@
  "+each respective tools/linker-tables/arch/$(ARCH)/include/asm/.\n"
  "+\n"
  "+Features evaluation\n"
- "+===================\n"
- "+\n"
+ "+=========+\n"
  "+This lists features currently being evaluated in the sandbox, not yet\n"
  "+present upstream. These make use of the existing set of header files\n"
  "+without modification.\n"
@@ -2731,15 +2724,15 @@
  "+{\n"
  "+\tif (SECTION_RANGE_ADDR_WITHIN(kprobes, addr))\n"
  "+\t\tif (should_match)\n"
- "+\t\t\tpr_info(\"== OK: %s within range!\\n\", test);\n"
+ "+\t\t\tpr_info(\"= OK: %s within range!\\n\", test);\n"
  "+\t\telse\n"
- "+\t\t\tpr_info(\"== FAIL: %s should not be in range...\\n\",\n"
+ "+\t\t\tpr_info(\"= FAIL: %s should not be in range...\\n\",\n"
  "+\t\t\t\ttest);\n"
  "+\telse\n"
  "+\t\tif (should_match)\n"
- "+\t\t\tpr_info(\"== FAIL: %s should be in range...\\n\", test);\n"
+ "+\t\t\tpr_info(\"= FAIL: %s should be in range...\\n\", test);\n"
  "+\t\telse\n"
- "+\t\t\tpr_info(\"== OK: %s not in range as expected!\\n\", test);\n"
+ "+\t\t\tpr_info(\"= OK: %s not in range as expected!\\n\", test);\n"
  "+}\n"
  "+\n"
  "+void early_init_kprobes(void)\n"
@@ -3974,4 +3967,4 @@
  "-- \n"
  2.11.0
 
-31cc67c035506fe9b2994b2b44f1048441e56240b0f93c03efe8840eeb0c80d1
+2825df6d93985a1a85670cad29639767d1a2f65562ce7326284c24088fc0455f

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.